I think there needs to have a compressor node for Core 4+, this is a facility that enables research to reduce the time to produce using Bcoin.

Right now, it's depressing to see the time it takes for kraken is 8 mins, icewall for 2 mins. A maxed out player shouldn't spend the same time to produce these programs compared to a lvl1 newbie. So I think a maxed out player should be able to produce these programs at 50%-60% of the original time, but only if they researched to the max level.

This would provide another level of progression, more like mini steps of achievements when let say a core lvl 8 can produce beam cannon at 16 seconds rather than 20 seconds. I know it might sound overpowered when you unlock higher level compiler, but I think it would provide something for the player to do rather than focusing on the building threads.

I saw some people are pointing out that, apart from 3-5 building threads and sometimes the use of evolver, there is nothing really else to invest on. This new compressor node will provide something extra for the player to plan on, to add some mini Bcoin sinks for higher levels. That's why I propose to introduce this node at around core 4/5. I think core 4 is the right level to introduce because level 5 introduces compiler lvl 2.

So I suggest around 20-30 levels of upgrade per program to research, each level up will reduce the time by quarter a second or something. Something that is meaningful rather than the outrageous production cost increase per upgrade (using the evolver)...

So for example: Beam Cannon takes 20 seconds to produceLevel 1-10 research would decrease the production time by 0.15 seconds. Level 11-20 research would decrease by 0.2 seconds.Level 21-24 research would decrease by 0.25 seconds.By level 24, you would decrease by 4.5 seconds. Of course, there might be further levels but this is a very crude example.

PluginNew type of software just like Node or Program. It works as an upgrade or support to the node it attached to, granting boosted or even new effects.

- PrismDefensive Plugin - Resource Nodes only---Used by selecting a resource node and attaching it when in Home---When attached node is being hacked, it will activate and cover the said node for as long as it stands. While activated, it will re-route every incoming hack into random free nodes nearby. Nodes that have been taken over won't count (unless it has only 1 connection and that node was already taken over, then the cover will immediately shatters). Its integrity will decrease overtime from re-routing the malwares, in which case the cover will break and the node will be vulnerable again.

Unique effect on maxed upgrade: It will keep cycling all projectiles onto random nodes each time. (Consistent-firing like Beam Cannon will have its trajectory changed randomly every second).

- BrickOffensive Plugin - Security Nodes only, limited usage---Used by selecting an already taken over host's Security node and attaching it---Shut down 1 of any security node that already taken over, resetting the buffer/firewall on said node, preventing any program installed, destroys any program installed beforehand. Can only use 2 at max per battle. Limit increases as it got upgraded.

Unique effect on maxed upgrade: Now bricked node will be permanently shutted down for the entirety of the battle.

- InjectorOffensive Plugin - any nodes except Core, limited usage---Used by selecting any node that hasn't been taken over---Attempting to overwrite host's node directly. Has different effects on each node type:> Security nodes: Will fight for the hacker in a timed duration, duration will decrease faster if actively being converted by antivirus.> Resource nodes: Will drain the resource at 10% speed until duration runs out or taken back by host/antivirus.> Depository nodes: Will add additional connection slot during battle> Other nodes: Will grant immediate took overInjections needed on each nodes will be different, based on both the Injector's and the target node's level, target node type, and target node tier. Can only fully inject (injecting until any node officially taken over by using Injector(s)) 1 node. Limit increases as it got upgraded.

Encrypted WLAN nodeAllows you to share your resources with friends. But there's a risk of your package discovered by other hackers while in transit (by viewing the globe), which they can then took for themselves. Each upgrade will increase the encryption bit strength, which in turn lowers the chance of the package becomes visible and also increase the limit size of how much resources you can send.

COM-Link nodeAllows you to establish a secure connection with other hackers. With this node, you can help other hackers fasten their upgrades or compilers, but there's a limit on how many nodes you can help in total. You can also send Apps to help fend off hackers when their home is being hacked.

You can also see a list of your friends once you built this node. There will be level, username, COM-Link space for Apps and whether they're online or offline and since when they've been offline.

- Amount of nodes that you can help fasten has minimum limit of 2. Example if you have 2 friends and each have 5 nodes you can help, you can only fasten 2 out of 10 nodes. Limit will increase as you upgrade the COM-Link.- Amount of Apps you can put is determined by your friend's COM-Link level. Limit increase as the COM-Link node upgraded.- Apps installed will be discarded once the COM-Link node taken over or if the owner decides to uninstall them.

Custom ROM nodeAllows you to install Apps into itself to help your network fight back against hack attempts. It has limited storage space to install, so at the minimum you can only install 1 App. Limit increase as it got upgraded.

Cache MemoryA type of reserved storage space in Program Library. It's used to store up Apps which later can be used to help your friends or your own network. Upgrading the Program Library will increase the available space.

AppsA compact software compiled in purpose of helping against invasion. Can be used defensively or offensively. You will need COM-Link node to install them on your friend's COM-Link node. You will need Custom ROM node to install them on your own Custom ROM node.

Sensor - Defensive AppWill help against stealth hacking by sending a scanning-worm on one of the connections the COM-Link/Custom ROM has each x seconds. It will increase the Visibility meter depending on how much stealth programs detected on each scan. This app will send a worm that will randomly go through nodes, inspecting it for few seconds, then jump to another node nearby. But it has limited jump, so it can't scan the entire network. Each time the worm go through a node that is infected with stealth program, the Visibility meter will increase.

Each upgrade will decrease the amount of seconds needed before the COM-Link/Custom ROM sends out another worm.Each upgrade will increase the jump limit.

Unique effect on maxed upgrade: the COM-Link/Custom ROM will send out 3 worms instead of 1 on random connections it has.

Repeater - Defensive AppWill give regeneration effect on lost firewall/buffer on any nodes in 2 connections away from the COM-Link/Custom ROM. Do nothing to nodes that have been taken over. Each upgrades will increase the amount regenerated.

Unique effect on maxed upgrade: less delay on regeneration rate.

Reverse Filter - Defensive AppWill make the COM-Link/Custom ROM cannot be targeted by disguising it as a malware, forcing the program to take a detour. Unless it is the only node that is connected by a taken over node that hasn't been taken over, then the enemy program will attack it. (Example, COM-Link/Custom ROM connected to 1. Core, 2. Sentry, 3. Program Library. The Library and Sentry also connected. If the Sentry taken over, enemy program will have to took over Library first, then the taken over Sentry can start attacking the COM-Link/Custom ROM node)

Upgrading it will decrease the time it takes to disguise the COM-Link/Custom ROM as a malware.

Unique effect on maxed upgrade: It will help destroying connected nodes that has been taken over.

Task Killer - Offensive AppWill target nodes that have programs installed. After few seconds of charging, it will deactivate the programs installed on the targeted node for few seconds. The hacker can just discard the deactivated programs and install new ones if they desire. Upgrades will decrease charging duration and increase deactivation duration.

Unique effect on maxed upgrade: instead of temporary deactivation, it will delete the installed programs completely. But it can only delete 1 program on each attempt, whilst deactivating normally the other programs installed.

Sandbox - Defensive Plugin, limited usage---Used by selecting any node except Core when in Home---It will activate after x seconds once the node it resides in taken over. This plugin will entrap any program installed and prevent installation until it's destroyed. But this also cause any Security node can't take back the node. It has its own firewall/buffer which will decrease from enemy program attacks. The taken over node will not get reverted back to the host from the activation of this Plugin.

Upgrading it will increase its firewall/buffer value and limit on how much node you can Sandboxed.

Unique effect on maxed upgrade: Will allow Security nodes or antivirus to take the node back.

Program: You are the attacker who has just taken out a turret (or any node with high firewall that needs to be held to proceed with the hack). Install this life leech program, on the turret, that attacks one node and uses the firewall of the node being attacked to replenish the turret's firewall. Basically, a sort of combined Protector and Beam. But the life leech shouldn't work on shields set by the Guardian.

Node: Similar function as the program. A very expensive high tier defensive node.

I think that they should update, statistic of the nodes, example, if u have Guardian, and u connect it to the one node, it should say how much more power node get from it example, turret have firewall on lvl 6 / 505 , when u connect lvl 4 guardian protection is 115, it should say on turret example 505+115 ... and so on.. srry for my bad english but i think that will be good to see that in future upgrades.

What the Tunnel does is it allows you to make a secure tunnel to another part of your network. It has one connection that can be used normally, and it has a tunnel connection that is represented as a dashed line. All damage sent through the tunnel connection is cut in half (This factor increases as the tunnel is leveled up). However, this also affects the damage of offensive security nodes. Scanners' ranges do not extend past the tunnel. A tunnel connection also counts as two regular connections with regard to the 9 connections away limit.

What the Tunnel does is it allows you to make a secure tunnel to another part of your network. It has one connection that can be used normally, and it has a tunnel connection that is represented as a dashed line. All damage sent through the tunnel connection is cut in half (This factor increases as the tunnel is leveled up). However, this also affects the damage of offensive security nodes. Scanners' ranges do not extend past the tunnel. A tunnel connection also counts as two regular connections with regard to the 9 connections away limit.

What do you think?

If its a defensive node, what do you mean by a tunnel to another part of your network? does it mean that the tunnel provides a sort of backdoor to another section of your network? if so, doesn't it kind of defeat the purpose of being a defensive node? Please do enlighten me on how it would work, otherwise it sounds to me like it works exactly how a code gate currently works.

What the Tunnel does is it allows you to make a secure tunnel to another part of your network. It has one connection that can be used normally, and it has a tunnel connection that is represented as a dashed line. All damage sent through the tunnel connection is cut in half (This factor increases as the tunnel is leveled up). However, this also affects the damage of offensive security nodes. Scanners' ranges do not extend past the tunnel. A tunnel connection also counts as two regular connections with regard to the 9 connections away limit.

What the Tunnel does is it allows you to make a secure tunnel to another part of your network. It has one connection that can be used normally, and it has a tunnel connection that is represented as a dashed line. All damage sent through the tunnel connection is cut in half (This factor increases as the tunnel is leveled up). However, this also affects the damage of offensive security nodes. Scanners' ranges do not extend past the tunnel. A tunnel connection also counts as two regular connections with regard to the 9 connections away limit.

What do you think?

If its a defensive node, what do you mean by a tunnel to another part of your network? does it mean that the tunnel provides a sort of backdoor to another section of your network? if so, doesn't it kind of defeat the purpose of being a defensive node? Please do enlighten me on how it would work, otherwise it sounds to me like it works exactly how a code gate currently works.

So here's how it would work:

Lets say you have a simple network like this:

Netconnection -> Tunnel ~> Code Gate -> Core

The tunnel is already captured and has a beam cannon installed on it that does 10 damage/sec. However, the connection between the Tunnel and Code Gate is a tunnel connection (hence the "~"). This causes all damage to be cut in half. So if the beam cannon tries to attack the Code gate, it will do 5 damage/sec instead of 10 damage/sec. This combined with the code gate would make attacking the Code Gate very difficult.

Let's consider this example to show the downfalls of Tunnels:

Netconnection -> Tunnel ~> Turret -> Core

Let's say again the tunnel is captured. However, now there is a Turret that does 10 damage/sec. So the Turret will attack the captured Tunnel as normal, however it will only do 5 damage/sec instead of 10 damage/sec.

Upgrading the Tunnel would increase it's firewall and the percentage by which damage is cut, so 50% would become 51% then 52% and so on as you upgrade.